PLS 21 Lecture Exam 2 Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the difference of the data and information? A B C Data are raw facts Information requires context to reveal meaning Information is the result of processing raw data to reveal meaning

A B C

Which programming language described in lecture offers the most flexibility, but the least ease of use? HTML Java Python Assembly

Assembly

Which programming language is most flexible. HTML R C++ Assembly Language

Assembly Language

What language allows us to use words instead of numbers? Machine Language Word Language Programming Language Virtual Language

Programming Language

What is data? Needs context Limited context Not facts Raw facts

Raw facts

The following are safe anti-virus systems except? Symmantec Norton Antivirus Rootkit Macaffe

Rootkit

Which of the followings is a great example of Visual Basic control name? LblEmployee txtHoursWorked bTNClose txthoursworked

txtHoursWorked

a set of rules to be followed in performing some operation or task. A calculus Finite Non-ambiguity An algorithms

An algorithms

How to secure your wireless network? Set up unique password for your device Enable encryption such as WPA Turn SSID off All of the above

All of the above

What are databases classified by? Database location(s) Expected type and extent of use Number of users All of the above

All of the above

What are some reasons for studying file systems? Knowledge of file system is useful for converting file system to database system Complexity of database design is easier to understand Understanding file system problems helps to avoid problems with DBMS systems All of the above

All of the above

What is a disadvantage of managing a database system? All of the above Management complexity Maintaining currency Increased costs

All of the above

What is malicious software? Gain unauthorized access to system resources Gather information that leads to loss of privacy or exploitation All of the above Designed to disrupt or deny operation

All of the above

What kinds of risks come with bluetooth-equipped devices? Bluesnarfing: hackers gain access to a phone's contacts Bluespamming: a phone's contacts are secretly sent text messages All of the above Bluejacking: anonymous text messages

All of the above

Which of the following is true regarding worms? Harm can come like viruses in files Doesn't need to attach itself to another program All of the above They are self-replicating

All of the above

What are some symptoms of an Infection? You get lots of system error messages. All of the above. You see unexpected messages or images. Programs start unexpectedly.

All of the above.

What is a well-defined, ordered set of steps for defining a problem? Operators Program Syntax Algorithms

Algorithms

Databases can be classified according to which of the following? All of above Number of users Database location(s) Expected type and extent of use

All of above

What are the major types of physical components? CPU Secondary storage devices Main Memory All of above

All of above

What are the major types of physical components? Secondary storage devices Main Memory All of above CPU

All of above

Threats are a serious deal and compromise our safety. Which of the following are examples of threats Malware All of the Above Trojan Worms

All of the Above

Which is an advantage and role of a Database Management System DBMS is the intermediary between user and database All of the Above DBMS enables data to be shared DBMS integrates many users' view of the data

All of the Above

Which of these modern settings involve data management? Administration Research All of the Above Business

All of the Above

Which is NOT a limitations of file system data management? System administration is complex and difficult Security features are likely inadequate Analysts must review and update file systems frequently Requires extensive programming

Analysts must review and update file systems frequently

Which of the following is NOT a computer threat? Malware Bacteria Virus Rootkit

Bacteria

Which of the following is NOT a risk resulting from the use of Bluetooth in the context on security? Bluejacking Bluehacking Bluebugging Bluespamming

Bluehacking

Which bluetooth threat allows hackers to gain access to a mobile phone's contacts? Bluesnarfing Bluespamming Bluebugging Bluejacking

Bluesnarfing

Which one is not a common programming language ? C++ Boa Java Visual Basic

Boa

If you think your computer has been infected, what are the recommended after action steps? Close current web browser and open a new one Update your antivirus and Check your antivirus software manufacturere's website for specific procedures and software for particular viruses Both A and B Disconnect from the internet both LAN & WAN

Both A and B

What is data? Source of information Plain information Generic information Building blocks of information

Building blocks of information

Which of the following is one of the four basic programming concepts? Programs Number Loops Equation

Loops

Which one is not an advantage of a database management system (DBMS)? Increased end-user productivity Maximized data inconsistency Better data integration Improved data access

Maximized data inconsistency

What is computer code? None of the above A handbook on how to operate a computer Computer instructions written in binary numbers Collection of computer instruction written in human-readable programming language (usually plain text)

Collection of computer instruction written in human-readable programming language (usually plain text)

What is a computer code? Language that is used in computer programming. collection of symbols that are relevant to computer coding. Collection of computer instructions written in a human-readable programming language, usually as plain text. A special code that is unique to every computer.

Collection of computer instructions written in a human-readable programming language, usually as plain text.

A dynamic IP address... Changes over time to protect information. Is only stable when using a CAT 5 Ethernet cable Is untraceable. Can only be used by laptops.

Changes over time to protect information.

Which of the following translates human-readable code into computer-readable instructions? Code Executioner Code Compiler Code Debunker Code Translator

Code Compiler

Which is not a computer threat? Malware Computer Virus Trojan Computer Crash

Computer Crash

What is the biggest threat faced by computers? Crimeware Malware Spontaneous combustion Viruses

Crimeware

Which of the followings is a basic element of a computer program? C. Logic ("if" statement) A. Variables and Assignments D. All of the above B. Arithmetic

D. All of the above

Which is NOT an example of a security threat? Malware Trojan Worm Danger Warning

Danger Warning

What are the building blocks of information? information atoms Data none of the above

Data

What is metadata? Metamorphic data Raw data Metabolism data Data about data

Data about data

What is/are characteristic(s) of a spyware? D. watches the actions of the user and passes it to a server A. Does not need to attach itself to another program B. destroys file C. trick the user into some action to activate the software on your computer

D. watches the actions of the user and passes it to a server

Which of the following is NOT an advantage of DBMS? Data redundancy Improved data sharing Better data integration Improved data access

Data redundancy

Data is managed most efficiently when stored in a ... Computer Database Drawer RAM

Database

What does DBMS stand for? Database managerial system Database management system Database multiple system Database multicycle short

Database management system

These are all programming languages EXCEPT Java Dutch Python C++

Dutch

which one is not the common programming language? Visual Basic python English Java

English

Which of the following is not a required software in the database system environment? Operating system software Hardware DBMS software Application programs and utility software

Hardware

What are the 5 major parts of a database system? Protocol, Hardware, Software, Data, People Data, Software, Procedures, Hardware, Planets Hardware, Software, People, Procedures, Data Software, Procedures, Places, Data, Hardware

Hardware, Software, People, Procedures, Data

What US Government agency is dedicated to cyber security? United States Department of Education United States Department of Energy Homeland Security United States Department of Defense

Homeland Security

Which of the following is not an example of an advantage of a DBMS? Improved data access Improve datum's appearance Improved data sharing Improved data security

Improve datum's appearance

Which of the following are NOT advantages of a DBMS? Minimized data inconsistency Increased money in our lawmakers pockets Better data integration Improved data sharing and security

Increased money in our lawmakers pockets

What is true about computer virus? It is always attached into some other non-malware software Not modeled after biological viruses User notices symptoms immediately Generally no damage occurs

It is always attached into some other non-malware software

Message authentication is a service beyond Message Sending Message Integrity Message Confidentiality Message Splashing

Message Integrity

It refers to the act of attempting to acquire sensitive information Worm None of the above Phishing Threat

Phishing

How do we program computers? Machine Language > Compiler > Programming Language Compiler > Programming Language > Machine Language Complier > Machine Language > Programming Language Programming Language > Compiler > Machine Language

Programming Language > Compiler > Machine Language

Which of the following is NOT true of programming languages? Software can convert programming language to machine language Programming language is more tedious than machine language Machine language consists of 1's and 0's Programming language consists of words

Programming language is more tedious than machine language

Which of these is NOT a major component of hardware? Main memory CPU Output devices Programs

Programs

What is not an advantage of database management systems? Improved data security Quicker data filtering Improved data access Improved data sharing

Quicker data filtering

Which of the following answer is not a right way to minimize the risk of threat? Use a firewall only visit trusted site Set your browser to remember your passwords use an antivirus software

Set your browser to remember your passwords

Which of the following is NOT an example of a threat to computer security Spartan Trojan Spyware Malware

Spartan

The following are types of treats to computer and network security except for Malware Virus Worm Spider

Spider

Which is not a basic element of a computer program? Variables and Assignments Logic Syntax Loops

Syntax

A relational database consists of a collection of Fields Records Tables Keys

Tables

What is syntax? A volatile type of memory An entire sequence of instructions That which provides everything needed to create, test, and debug software. The correct use of key words, operators, and programmer-defined names.

The correct use of key words, operators, and programmer-defined names.

The Compiler is the Programmer Computer Engineer Translator

Translator

Which threat may appear to perform a desirable function but actually performs undisclosed malicious functions? Trojan Computer virus Spyware Malware

Trojan

Data must be processed in order to produce information. True. Sometimes A, sometimes B. False. Is this a trick question? Data and information are the same.

True

How to minimize the risk of most threats? Use a firewall Open email attachments from untrusted sources Download unknown content from trusted sites Give someone your password

Use a firewall

Which one does NOT belong to the 4 rules in access? Tables must be closed One of the fields must be a primary key. We need to double check the colour of header. The fields must have the same data type, but field names can be different.

We need to double check the colour of header.

What is an algorithm? Objects that have both data elements and can perform a function Well-defined, ordered set of steps used to solve a problem A type of programming language A special language computers speak

Well-defined, ordered set of steps used to solve a problem Which of these is NOT a major component of hardware? Main memory CPU Output devices Programs

Which kind of threat is self-replicating? Phishing Worms Rootkit Trojian

Worms

What is the correct order of the programming work-flow? Write the code in an editor program, run the program/executable file, compile the code producing an executable file Write the code in an editor program, compile the code producing an executable file, run the program/executable file Compile the code producing an executable file, write the code in an editor program, run the program/executable file Run the program/executable file, write the code in an editor program, compile the code producing an executable file

Write the code in an editor program, compile the code producing an executable file, run the program/executable file

What are the important aspects of an algorithm? finite a & c ambiguity non-ambiguity

a & c

what are the things you can do to secure your network? all turn SSID off Encryption Have a strong password

all

Database can be classified according to? expect of type and extent of use number of users database location all of the above

all of the above

Malware consists of what type of programming? all of the above scripts active content codes

all of the above

What consists of programming? scripts active content all of the above codes

all of the above

What is the role and advantage of DBMS? it enables data to be shared it integrates many users' views of the data all of the above it is the intermediary between the user and the database

all of the above

Which statement about malware is correct? malicious software designed to disrupt or deny operation all of the above consists of programming

all of the above

All of the following describe the advantages of Database Management Systems except: improved data sharing better data integration decrease in productivity improved data security

decrease in productivity

What does XML stand for? excess markup language extensible markup language xray markup language extra markup language

extensible markup language

What is the name for the physical components of a computer? roughware toughward software hardware

hardware

which one is not the advantage of a DBMS? Better data integration Improve decision making maximized data inconsistency Improve data access

maximized data inconsistency

How to start an new file script in Rstudio open a new markdown open a new rnotebook open a new rscript open r presentacion

open a new rscript

All of the following are types of computer hardware, EXCEPT: input devices CPU output devices operating system

operating system

What is data? data is the same as information raw facts data is made up from information something that doesn't need to be formatted for storage and processing

raw facts

What is data? something that requires context to reveal meaning the result of processing raw data to reveal meaning information raw facts

raw facts

What is the definition of End-user data? data about data raw facts of interest to end user data about computer programs data about hard drives

raw facts of interest to end user

What is a worm? something you get if you are the early bird self replicating, have to attach to another program, can transmit across files and destroy files malicious software, consists of programming that is designed to disrupt or deny operation and gather info for lost of privacy of exploitation appear to do something desirable, but actually do harm

self replicating, have to attach to another program, can transmit across files and destroy files


Kaugnay na mga set ng pag-aaral

Mood adjustment and Dementia Disorders

View Set